Introduction to dimensional method
By: Material type:
TextLanguage: English Publication details: 1962Description: p. cmSubject(s): DDC classification: - C151, K2 CS
Textual
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textual
|
Central Science Library | Central Science Library | C151 K2 CS (Browse shelf(Opens below)) | Available | SL0185946 |
There are no comments on this title.
Log in to your account to post a comment.
-
3601
Hands-On siignal analysis with python: An introduction
by Haslwanter, Thomas -
3602
Handwritten Historical Document Analysis, Recognition, and Retrieval - State of the Art and Future Trends
by Fischer Andreas, Liwicki Marcus & Ingold Rolf Jurg -
3603
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography
by Dube Roger -
3604
Harmonization of ICT standards related to Arabic l
-
3605
Harmonization of ICT standards related to Arabic l
-
3606
HCISPP Study Guide
by Virtue, Timothy -
3607
Heat engineering
by Shvets I T -
3608
Heat engines
by Low David Allan -
3609
Heat engines
by Low David Allan -
3610
Heat pumps
by Sporn Philip -
3611
Heterogeneous cellular networks
by Hu Rose Qing Yang Ed.; Qian Yi Ed. -
3612
Heterogeneous Computing with OpenCL
by Gaster, Benedict -
3613
Heterogeneous Computing with OpenCL 2.0
by Kaeli, David -
3614
Heterogeneous System Architecture
by Hwu, Wen-mei -
3615
Hidden Markov Models: Applications in Computer Vision
by Bunke Horst & Caelli Terry -
3616
Hidden Semi-Markov Models
by Sheng Zheng, Yu -
3617
Hiding Behind the Keyboard
by Shavers, Brett -
3618
Hierarchical associative processing systems
by Stuttgen Heinrich J -
3619
Hierarchical matrices: Algorithms and analysis
by Hackbusch Wolfgang -
3620
Hierarchically Intelligent Machines
by Saridis G N -
3621
High level COBOL programming
by Weinberg Gerald M -
3622
High level language and their compile
by Watson Des -
3623
High performance compilers for parallel computing
by Wolfe Michael -
3624
High Performance Computing and Its Applications in the Physical Sciences - Proceedings of the Mardi Gras '93 Conference
by Browne D A Et Al -
3625
High Performance Deformable Image Registration Algorithms for Manycore Processors
by Shackleford, James -
3626
High Performance Parallelism Pearls
by Reinders, James -
3627
High Performance Parallelism Pearls Two
by Jeffers, Jim -
3628
High Performance Scientific Computing Using Distributed Infrastructures
by Merola Leonardo Et Al -
3629
High speed computation
by Kowalik Janusz S Ed. -
3630
High Speed Digital Design
by Zhang, Hanqiao -
3631
High speed LAN technology handbook
by Chowdhury Dhiman Deb -
3632
High speed LAN technology: handbook
by Chowdhury Dhiman Deb -
3633
High stakes no prisoners: a winner's tale of greed and glory in the internet wars
by Ferguson Charles H -
3634
High-level languages for microprocessor projects
by Taylor David -
3635
High-performance client/server : a guide to building and managing robust distributed systems
by Loosley Chris -
3636
High-Performance Embedded Computing
by Wolf, Marilyn -
3637
High-speed analog computers
by Tomovic Raj Ko -
3638
High-speed memory systems
by Pohm A V -
3639
Highly parallel computing
by Almasi George S -
3640
Highly parallel computing
by Almasi George S -
3641
Historian and the computer: A practical guide
by Shorter Edward -
3642
History of cyber security attacks: 1980 to present
by Middleton Bruce -
3643
Hooked on Java: creating hot Web sites with Java applets
by Hoff Arthur van -
3644
Hospitals- A system approach
by Garrett Raymon D -
3645
How computers play chess
by Levy David -
3646
How the new techology works : A guide to high - tech concepts
by Cone Robert J -
3647
How to Attack and Defend Your Website
by Dalziel, Max -
3648
How to control costs in your pollution prevention programme
by Chichowicz Judith A -
3649
How to Define and Build an Effective Cyber Threat Intelligence Capability
by Dalziel, Max -
3650
How to list software packages: A step-by step guide to assuring they do what you want
by Perry William E
Introduction to dimensional method
APA
Jupp Edmund W, . (1962). Introduction to dimensional method. : .
Chicago
Jupp Edmund W, . 1962. Introduction to dimensional method. : .
Harvard
Jupp Edmund W, . (1962). Introduction to dimensional method. : .
MLA
Jupp Edmund W, . Introduction to dimensional method. : . 1962.
